Share This Author
US Secure Hash Algorithm 1 (SHA1)
The purpose of this document is to make the SHA-1 (Secure Hash Algorithm 1) hash algorithm conveniently available to the Internet community. The United States of America has adopted the SHA-1 hash…
Domain Name System Security Extensions
Extensions to the DNS are described that provide these services to security aware resolvers or applications through the use of cryptographic digital signatures and are included in secured zones as resource records.
XML Encryption Syntax and Processing
- D. Eastlake
An exhaust gas recirculator in an internal combustion engine wherein a part of the exhaust gas is supplied to a suction manifold only at the time when the throttle valve is opened and in some time…
XML-Signature Syntax and Processing
This document specifies XML (Extensible Markup Language) digital signature processing rules and syntax. XML Signatures provide integrity, message authentication, and/or signer authentication services…
Transport Layer Security (TLS) Extensions: Extension Definitions
- D. Eastlake
- Computer ScienceRFC
Secret Key Transaction Authentication for DNS (TSIG)
This protocol allows for transaction level authentication using shared secrets and one way hashing. It can be used to authenticate dynamic updates as coming from an approved client, or to…
US Secure Hash Algorithms (SHA and HMAC-SHA)
SHA-1's sample code from RFC 3174 has also been updated to handle input strings of arbitrary bit length, and code to perform SHA-based HMACs, with arbitrarybit length text, is included.
Routing Bridges (RBridges): Base Protocol Specification
Routing Bridges (RBridges) provide optimal pair-wise forwarding without configuration, safe forwarding even during periods of temporary loops, and support for multipathing of both unicast and…
Randomness Recommendations for Security
The use of pseudo-random processes to generate secret quantities can result in pseudo-security because the sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities than to locate the quantities in the whole of the number space.